Toggle navigation
About Us
Consulting Services
Strategic Security Consultation
Business Continuity Management
Compliance
Data Classification & Protection
Information Security Management
Third Party Risk Management (TPRM)
Technical Security Consultation
Infrastructure Security
Compromise Assessments
Firewall Rules Review
High-Level Secure Architecture Review
Infrastructure Penetration Testing
Low-Level Secure Configuration Review
Minimum Baseline Security Standard Development
Vulnerability Assessment
Red Teaming
Applications Security
Mobile Application Penetration Testing
Software Source Code Review
Web Application Vulnerability Assessment & Penetration Testing
Security Operations
SOC – Framework Development
SOC – Security Operations Assessment
Solutions
Network Detection and Response (NDR)
Data Classification
GRC Platform
Network Broker
Vulnerability Management
Web Application Assessment
SIEM
MSS
Advanced Threat Hunting
Cybersecurity Professionals as a Service
Incident Response Retainer
Proactive Compromise Assessment
Reactive Compromise Assessment
Security Monitoring
Academy
About Academy
Training Schedule
Training Courses
Training Tracks
Contact us
About Us
Consulting Services
Strategic Security Consultation
Business Continuity Management
Compliance
Data Classification & Protection
Information Security Management
Third Party Risk Management (TPRM)
Technical Security Consultation
Infrastructure Security
Compromise Assessments
Firewall Rules Review
High-Level Secure Architecture Review
Infrastructure Penetration Testing
Low-Level Secure Configuration Review
Minimum Baseline Security Standard Development
Vulnerability Assessment
Red Teaming
Applications Security
Mobile Application Penetration Testing
Software Source Code Review
Web Application Vulnerability Assessment & Penetration Testing
Security Operations
SOC – Framework Development
SOC – Security Operations Assessment
Solutions
Network Detection and Response (NDR)
Data Classification
GRC Platform
Network Broker
Vulnerability Management
Web Application Assessment
SIEM
MSS
Advanced Threat Hunting
Cybersecurity Professionals as a Service
Incident Response Retainer
Proactive Compromise Assessment
Reactive Compromise Assessment
Security Monitoring
Academy
About Academy
Training Schedule
Training Courses
Training Tracks
Contact us
Info
Training
Tracks
Sample of Customized training tracks based on NICE Framework
Securely Provision (SP)
Entry Level
Security+ and/or CNDv2
Cloud+
CySA+ and/or CSA
IoT Practitioner
Intermediate Level
CEHv12
CompTIA PenTest+
Advanced Tools
CPENT
Case.NET
Case.Java
Operate and Maintain (OM)
Entry Level
Server+
Network+
A+
Intermediate Level
Security+ and/or CNDv2
Cloud+
IoT Practitioner
CVA
Advanced Tools
CEHv12
Dev-SecOps
CISM
Protect and Defend (PD)
Entry Level
Server+
Network+
IoT Practitioner
Server+
Network+
A+
Intermediate Level
Security+
CNDv2
Cloud+
Advanced Tools
CEHv12
CySA+
CSA
CFR
Analyse (AN)
Entry Level
CEHv12
CNDv2
Security+
Intermediate Level
CySA+ and/or CSA
CER
Advanced Tools
CHFI
ECIH
Sample of IT Security C&T Workshops
Workshop
Network and System Penetration Testing
Workshop
Nmap Workshop
Workshop
Network Monitoring and Analysis with Tcpdump
Workshop
Web Application Penetration testing (OWASP)
Workshop
PT with Metasploit
Workshop
Burp Suite and SQLMAP